<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f62eb79d-278f-4fc7-8d99-a6c0dfef4f9e"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5a37cbe7-28b7-47a4-90e5-e7f5d70c3a9f"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 05\] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eca5f6d0-b223-4052-be84-e4d1f24160c3"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro> \[Concurrency 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bea10eac-642a-4ffd-a48e-9ea7e0927409"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro> \[Cookbook 04\] Java Cookbook, by Ian F. Darwin (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1cf5fc69-c704-4a93-9590-22ad368335a6"><ac:parameter ac:name="">EJPLG 01</ac:parameter></ac:structured-macro> \[EJPLG 01] Effective Java, Programming Language Guide, by Joshua Block. Addison Wesley. (2001) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e0327c4b-bfbb-4ac3-bf32-71b4ff3088b8"><ac:parameter ac:name="">EJS 04</ac:parameter></ac:structured-macro> \[EJS 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f3fefeda-879a-4c71-aff3-7538a4c8eda2"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro> \[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="870da6b5-6830-4f35-803c-e8fb62463fc4"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro> \[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0617701b-fbbf-44b8-bbf4-5ccc34c35886"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro> \[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="12b81752-ffb2-488f-8732-6bd605de8a45"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation ver 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85c2211d-f836-4da0-a5d5-4c2e9223282b"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro> \[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8705a1b-e8cb-4cae-ab8a-26b57166b26c"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro> \[Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37078635-115a-43eb-8aa4-dd32fa856c46"><ac:parameter ac:name="">JNI 97</ac:parameter></ac:structured-macro> \[JNI 97\] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a90e1acd-7d7a-4dbd-a9d3-3b915fc98aac"><ac:parameter ac:name="">JNS 98</ac:parameter></ac:structured-macro> \[JNS 98\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="12fdf1aa-8e17-45db-9220-5b93317ec804"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d80a87b-8f7a-477d-8499-e8538c8be0a8"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro> \[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="87b7ef64-6577-49d1-90eb-e1baac73d67c"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro> \[McGraw 00\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5ff5c1d6-7dfe-41a7-9225-f300ad1d8cfb"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7cff751d-941c-4d9a-aa1a-6d87663026af"><ac:parameter ac:name="">Patterns 05</ac:parameter></ac:structured-macro> \[Patterns 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff8a77c5-7868-4d91-8154-8ab94b5a658f"><ac:parameter ac:name="">Pitfalls 03</ac:parameter></ac:structured-macro> \[Pitfalls 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fde2474c-4587-4db6-9b29-0e48decd1a14"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro> \[SecArch 06\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2360c2ca-070d-4415-b084-3670ca958051"><ac:parameter ac:name="">Secrets 97</ac:parameter></ac:structured-macro> \[Secrets 97\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="88413a66-ca5d-44ac-8832-880cd43d2d2b"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006) |